More stories

  • in

    Don’t tell your AI anything personal, Google warns in new Gemini privacy notice

    Maria Diaz/ZDNET The Gemini app, formerly known as Bard, is poised to become the next-generation digital assistant on Android devices. This new AI-centric landscape promises to make interacting with your smartphones and other devices considerably smarter and easier. But those AI apps come with a risk, which Google’s new privacy warning illustrates perfectly. Also: The […] More

  • in

    5 reasons why I use Firefox when I need the most secure web browser

    <!–> Anadolu/Contributor/Getty Images I’ve been using Firefox for a very long time. Although it’s not currently set as my default web browser, whenever I need to do something that requires heightened security (such as sending banking or viewing sensitive information), I always turn to the open-source web browser. This is not to say that other […] More

  • in

    Secure a reliable cyber security education for $46

    <!–> Save 65% on these cyber security courses. StackSocial Cyber security is something that is needed by virtually everybody in today’s society. Whether you’re a business leader who is looking for ways to improve protection while keeping costs manageable, an aspiring IT professional or specialist, or an everyday person, brushing up on cyber security can […] More

  • in

    I tested iOS 17.3.1: What’s inside, who needs it, and how it affected my iPhone

    <!–> Jaap Arriens/NurPhoto via Getty Images While we’ve been patiently waiting for Apple to release iOS 17.4, the company surprised us by launching an unexpected update for the iPhone: iOS 17.3.1, alongside iPadOS 17.3.1. So, what does this update include? Is it necessary? And importantly, could it potentially cause issues for your iPhone? Also: 7 hacking […] More

  • in

    This botched migration shows why you need to deal with legacy tech

    <!–> aire images/Getty Images While working on a piece about the talent crunch in cybersecurity, I was a tad surprised when legacy systems popped up as a common challenge that IT administrators struggle with today.  I expected organizations would have figured out by now that IT sprawl is costly and their adoption of new technology […] More

  • in

    Shim vulnerability exposes most Linux systems to attack

    <!–> Andrew Brookes/Getty Images Another day, another potential Linux security problem. This time around, it’s a critical vulnerability in shim – the key link between Linux and your computer’s firmware during boot. Left unrepaired, a network attacker could bypass secure boot and take control of your system. First things first: The shim in question is […] More

  • in

    The Linux Foundation and its partners are working on cryptography for the post-quantum world

    We know the end of the line is in sight for classical cryptography. All the security encryption that protects our bank accounts, websites, and credit cards today will eventually be broken. That’s not just a threat; that’s the reality.  When Q-Day comes, which is the day quantum computers can break our existing encryption methods, we’ll […] More

  • in

    3 million smart toothbrushes were not used in a DDoS attack after all, but it could happen

    <!–> chang/Getty Images It sounds more like science fiction than reality, but Swiss newspaper Aargauer Zeitung reported that approximately three million smart toothbrushes were hijacked by hackers to launch a Distributed Denial of Service (DDoS) attack. These innocuous bathroom gadgets – transformed into soldiers in a botnet army – allegedly knocked out a Swiss company for several […] More